Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment authentication method and device, equipment and storage medium

A technology for equipment authentication and equipment, applied in safety devices, electrical components, wireless communications, etc., can solve the problems of low cost and high security of equipment certification, so as to avoid high cost and solve the problem of high security and high security low cost effect

Active Publication Date: 2021-08-20
SHENZHEN LUMIUNITED TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Each embodiment of the present invention provides a device authentication method, device, device and storage medium to solve the high security and low cost of device authentication existing in related technologies Difficult to balance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method and device, equipment and storage medium
  • Equipment authentication method and device, equipment and storage medium
  • Equipment authentication method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0040] figure 1 It is a schematic diagram of an implementation environment involved in a device authentication method. The implementation environment includes a first device 110 and a second device 130 .

[0041] Wherein, both the first device 110 and the second device 130 can be smart phones, smart printers, smart fax machines, smart cameras, smart air conditioners, smart door locks, or human bod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an equipment authentication method and device, equipment and a storage medium, and the equipment authentication method comprises the steps: enabling first equipment to generate a first authentication message for starting equipment authentication, outputting the first authentication message, and prompting a user to move second equipment to a first designated area through the output of the first authentication message; based on an antenna array deployed in the first device, positioning the second device according to a first positioning message sent by the second device, and obtaining a first position of the second device relative to the first device; when the first position, relative to the first device, of the second device is located in a first designated area, determining that the orientation authentication about the first designated area is successful, and carrying out orientation authentication about a second designated area for device movement carried out again by the user; if the orientation authentication with respect to the second designated area is successful, determining that the equipment authentication is successful. According to the invention, the problem that high security and low cost are difficult to consider in equipment authentication in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of equipment authentication, in particular to an equipment authentication method, device, equipment and storage medium. Background technique [0002] With the development of computer technology, wireless communication between devices is vulnerable to attackers, also known as man-in-the-middle (MITM, man in the middle) attacks. Therefore, before wireless communication, the device for wireless communication needs to be authenticated , to ensure the security of wireless communication. [0003] At present, device authentication based on the Bluetooth protocol mainly includes two schemes: passkey and OOB (out of band). The first scheme is based on the in-band transmission key, as long as the master and slave devices use the same key for authentication, the device authentication is considered successful; the second scheme is based on the out-of-band transmission key, such as QR code or NFC, and then the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/63H04W12/06
CPCH04W12/06
Inventor 吕浩洋
Owner SHENZHEN LUMIUNITED TECH CO LTD